Page 1 / 2   >   >>
WanaCrypt0r Hits Worldwide
Pieter Arntz, Malware Intelligence Researcher, MalwarebytesCommentary
Consumers and businesses should be sure their Windows systems and software are updated with all current patches in order to stop the spread of this dangerous ransomware attack.
By Pieter Arntz Malware Intelligence Researcher, Malwarebytes, 5/13/2017
Comment0 comments  |  Read  |  Post a Comment
Malspam Causing Havoc for Mac & Windows
Malwarebytes Labs, Malwarebytes LabsCommentary
Spam is a multi-platform, multi-vector approach to network compromise, and organizations need to weigh up the risks on all fronts to be able to combat it successfully.
By Malwarebytes Labs Malwarebytes Labs, 5/9/2017
Comment0 comments  |  Read  |  Post a Comment
OSX.Bella: Mac Malware Strikes Again
Thomas Reed, Director of Mac Offerings, MalwarebytesCommentary
This variant of the OSX.Dok dropper behaves altogether differently, and installs a completely different payload.
By Thomas Reed Director of Mac Offerings, Malwarebytes, 5/2/2017
Comment0 comments  |  Read  |  Post a Comment
Locky Returns with a New (Borrowed) Distribution Method
Jerome Segura, Lead Malware Intelligence Analyst, Malwarebytes, Commentary
A layered defense is a strong security posture for dealing with a threat like Locky, that can come in different disguises.
By Jerome Segura, Lead Malware Intelligence Analyst, Malwarebytes , 4/26/2017
Comment0 comments  |  Read  |  Post a Comment
Cybercrime Tactics & Techniques: Q1 2017
Malwarebytes Labs, Malwarebytes LabsCommentary
A deep dive into the threats that got our attention during the first three months of the year and what to expect going forward.
By Malwarebytes Labs Malwarebytes Labs, 4/18/2017
Comment0 comments  |  Read  |  Post a Comment
Securing your Privacy on Android
Nathan Collier, Senior Malware Intelligence Analyst, MalwarebytesCommentary
If you work at a company that allows you to use your mobile device to login to email, access company data, or connect to company Wi-Fi, youre more of a security risk than you think.
By Nathan Collier Senior Malware Intelligence Analyst, Malwarebytes, 4/12/2017
Comment0 comments  |  Read  |  Post a Comment
OSX.Dok: New & Sophisticated Mac Malware Strikes
Thomas Reed, Director of Mac Offerings, MalwarebytesCommentary
Phishing-deployed malware can capture account credentials for any website users log into.
By Thomas Reed Director of Mac Offerings, Malwarebytes, 4/7/2017
Comment0 comments  |  Read  |  Post a Comment
Top 5 Dumbest Cyber Threats That Still Pay Off
Malwarebytes Labs, Malwarebytes LabsCommentary
Some hackers are fairly predictable in their successful use of really dumb attacks.
By Malwarebytes Labs Malwarebytes Labs, 4/4/2017
Comment1 Comment  |  Read  |  Post a Comment
Exploit Kits: Winter 2017 Review
Jerome Segura, Lead Malware Intelligence Analyst, Malwarebytes, Commentary
We take another look at the current EK scene by going over RIG, Sundown, Neutrino and Magnitude.
By Jerome Segura, Lead Malware Intelligence Analyst, Malwarebytes , 3/28/2017
Comment0 comments  |  Read  |  Post a Comment
Malware Explained: Packer, Crypter & Protector
Pieter Arntz, Malware Intelligence Researcher, MalwarebytesCommentary
These three techniques can protect malware from analysis. Heres how they work.
By Pieter Arntz Malware Intelligence Researcher, Malwarebytes, 3/22/2017
Comment0 comments  |  Read  |  Post a Comment
7 Things You Need to Know about Bayesian Spam Filtering
Pieter Arntz, Malware Intelligence Researcher, MalwarebytesCommentary
Knowing how spam filters work can clarify how some messages get through, and how your own emails can avoid being caught.
By Pieter Arntz Malware Intelligence Researcher, Malwarebytes, 3/14/2017
Comment0 comments  |  Read  |  Post a Comment
4 Ways to Recover from a Cyberattack
Malwarebytes Labs, Malwarebytes LabsCommentary
Be prepared and act quickly are two key steps that will help you bounce back quickly from a cyberattack.
By Malwarebytes Labs Malwarebytes Labs, 3/8/2017
Comment0 comments  |  Read  |  Post a Comment
Adware vs. Ad Fraud: Viva la Difference!
Pieter Arntz, Malware Intelligence Researcher, MalwarebytesCommentary
Both earn their money in the advertising trade but they each have very different means of operation and targets.
By Pieter Arntz Malware Intelligence Researcher, Malwarebytes, 3/6/2017
Comment0 comments  |  Read  |  Post a Comment
DNSSEC: Why Do We Need It?
Pieter Arntz, Malware Intelligence Researcher, MalwarebytesCommentary
The number of signed domain names has grown considerably over the past two and a half years but some sectors are heavily lagging behind.
By Pieter Arntz Malware Intelligence Researcher, Malwarebytes, 3/1/2017
Comment1 Comment  |  Read  |  Post a Comment
Mac Malware Reaches New Highs
Thomas Reed, Director of Mac Offerings, MalwarebytesCommentary
Two new malware threats in a week this past month, plus others in January, brings the 2017 Mac malware count up to 6 and growing.
By Thomas Reed Director of Mac Offerings, Malwarebytes, 2/28/2017
Comment0 comments  |  Read  |  Post a Comment
Meet 'Fruitfly:' Mac Malware Targeting Biomedical Research Centers
Malwarebytes Labs, Malwarebytes LabsCommentary
This newly discovered code contains indications that it has been circulating undetected for at least a couple years.
By Malwarebytes Labs Malwarebytes Labs, 1/24/2017
Comment0 comments  |  Read  |  Post a Comment
Threat Attribution: Misunderstood & Abused
Malwarebytes Labs, Malwarebytes LabsCommentary
Despite its many pitfalls, threat attribution remains an important part of any incident response plan. Heres why.
By Malwarebytes Labs Malwarebytes Labs, 1/18/2017
Comment0 comments  |  Read  |  Post a Comment
Understanding The Basics Of Two-Factor Authentication
Malwarebytes Labs, Malwarebytes LabsCommentary
With data breaches resulting in leaked passwords occurring almost daily, two-factor authentication has become an essential tool in the security toolkit.
By Malwarebytes Labs Malwarebytes Labs, 1/16/2017
Comment2 comments  |  Read  |  Post a Comment
Operational Security Best Practices For Social Media
Malwarebytes Labs, Malwarebytes LabsCommentary
Building a firm, clear policy on disclosures online can provide a flexible, adaptive response that will protect proprietary data from winding up in a public leak.
By Malwarebytes Labs Malwarebytes Labs, 1/11/2017
Comment0 comments  |  Read  |  Post a Comment
Online Or Offline, Ransomware Will Find You
Malwarebytes Labs, Malwarebytes LabsCommentary
The current threat landscape is a mish-mash of online ransomware, offline ransomware, and those that are a mixture of the two.
By Malwarebytes Labs Malwarebytes Labs, 1/9/2017
Comment0 comments  |  Read  |  Post a Comment
Page 1 / 2   >   >>
1268
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Malwarebytes protects businesses against malicious threats that escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware, the companys flagship product, has a highly advanced heuristic detection engine that has removed more than five billion malicious threats from computers worldwide. SMBs and enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, the company is headquartered in California with offices in Europe, and a global team of researchers and experts. For more information, please visit us at www.malwarebytes.com/business.
Featured Writers
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.